Fall 2013 Schedule

Date
Chapter
Coverage
Readings
Assignment
Due Date
08/21/2013
Introduction




08/28/2013
Chapter 1
The Threat Environment
Read the 3 Threat Environment articles and be prepared to discuss in class.


09/04/2013
No Class




09/11/2013
Chapter 2
Planning & Policy
We will be discussing an alternative Risk Assessment method OCTAV Alegro, you can read more here.


09/18/2013
Module A
Networking Concepts



09/25/2013
Chapter 3
Cryptography
Read the Cryptography Readings from the Class Readings page


10/02/2013
Chapter 4
Secure Networks



10/03/2013 to 10/07/2013
Exam 1 (Chapter 1-4, Module A, Readings)




10/09/2013
Chapter 5
Access Controls



10/16/2013
Readings
Passwords
Read the required readings from the Password section of the Class Readings


10/23/2013
Chapter 6
Firewalls

Access Control Simulation
10/30/2013
10/28/2013
Withdrawal Deadline




10/30/2013
Chapter 7 & 8
Host Hardening & Application Security
Read the required Application Hardening articles section of the Class Readings


11/06/2013
Chapter 9 & 10
Data Protection & Incident and Disaster Response



11/13/2013
Readings
SOX IT Readings
Read the required readings from the IT Control and SOX section of the Class Readings
Security in the News
11/20/2013
11/20/2013
Readings
COSO, COBIT, ERM
From the Frameworks & Standards page, read:


11/27/2013
Readings
Additional Readings
  1. Cyberattack's abound yet companies tell SEC losses are few By Chris Strohm, Eric Engleman and Dave Michaels - Apr 3, 2013)
  2. CF Disclosure Guidance: Topic No. 2 S.E.C. (This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
  3. AICPA Top 5 Cybercrimes (2013)
  4. ERM for cloud computing (COSO)


11/30/2013 to 12/04/2013
Final Exam (5-10) and Readings